Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 15:07
Static task
static1
Behavioral task
behavioral1
Sample
9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe
-
Size
180KB
-
MD5
9576ced894b1306bb46ea64e5e3cc1b3
-
SHA1
b0aedd64fd52a19d80df3381df1d3a2ff0fef3e9
-
SHA256
bb9addc975dfdf9dfde3a22e8b9dbba679549961676b4e4bce26caaeefc6a304
-
SHA512
a9caa0e61e5c356ef79bff9223e1db1a0a6d40690d7b59a601230c0aa2434bba90dbb7035d9e0d90ba9339e6ab79826d40f5c576c77288252119b6f40936c275
-
SSDEEP
3072:KEVm8FDMBRQW578SzOKdImBUdkDnnzUn0e4TZAQEjaPHEG4hJo5kLctnYZst6AZe:1NJMrdJ5dImBKckD4TKaPE3C5kLctnYn
Malware Config
Signatures
-
Cycbot family
-
Detects Cycbot payload 5 IoCs
Cycbot is a backdoor and trojan written in C++.
resource yara_rule behavioral2/memory/3148-15-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/4228-16-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/4228-17-0x0000000000400000-0x0000000000452000-memory.dmp family_cycbot behavioral2/memory/3264-136-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot behavioral2/memory/4228-287-0x0000000000400000-0x0000000000455000-memory.dmp family_cycbot -
resource yara_rule behavioral2/memory/4228-3-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3148-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3148-15-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4228-16-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4228-17-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/3264-135-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/3264-136-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral2/memory/4228-287-0x0000000000400000-0x0000000000455000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4228 wrote to memory of 3148 4228 9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe 86 PID 4228 wrote to memory of 3148 4228 9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe 86 PID 4228 wrote to memory of 3148 4228 9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe 86 PID 4228 wrote to memory of 3264 4228 9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe 90 PID 4228 wrote to memory of 3264 4228 9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe 90 PID 4228 wrote to memory of 3264 4228 9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe startC:\Program Files (x86)\LP\D046\F88.exe%C:\Program Files (x86)\LP\D0462⤵PID:3148
-
-
C:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\9576ced894b1306bb46ea64e5e3cc1b3_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\6D433\6F8D0.exe%C:\Users\Admin\AppData\Roaming\6D4332⤵PID:3264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD5c89d38796410a35be61b7fcff92b929b
SHA1ef02098c60d3ece47ca321d1143d2c3a36d7c650
SHA256ec6480d75abefaf2b93318347d6d617f40b678d7153e26ffb1d44f07331df316
SHA5122871ced159199a662b75545bf3f2f685e949427b1b2b3041d06c6d6018c21f31f30207c7df568eea56aa9367ba287d7d6c522aa09c7ee429048aedee4f2123a3
-
Filesize
600B
MD502322ada5825acc8053a31ddfc9cfd5d
SHA19af94d69a584ea6ef971d5bff98c23ad509aa466
SHA256e8730069e7e4015e6630ad8039d7438a0988ec791b3e4812fe9806de90a8fb7f
SHA51224926b6b672067691f26aab4376cbea297a2529fd24ad7005cbc81c43e70ef33148d84248e1ddde703f3c81b909121e5e6947624b05a6bb3818eca98ccd965f2
-
Filesize
1KB
MD584ad327464163ee74cb70d50c1d20aa7
SHA16ef3711554eb66e59f4f4ae00551c492301b4260
SHA256beee7d8ac28f31beae33cb00de1d7e3e6bf18639194bcc5fe98c71153ff0e6be
SHA512a5551b6a915818ef0c85144cb1184da46b9dbc1f5abdac001430a5c54bbada862995ea0a0d3478225fbf631c19c7a331daf5ce3af2ab2f3351e8b5e6b2695bcb